F2 Functionality Identification
Identifying common cryptographic algorithms in binaries through, for example, use of standard constants and common instructions.
Identifying network send/receive loops
Infection vectors and persistence mechanisms
Identifying common cryptographic algorithms in binaries through, for example, use of standard constants and common instructions.
Identifying network send/receive loops
Infection vectors and persistence mechanisms
Comments
Post a Comment